What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
Multiple vulnerabilities in Google Android operating system could allow remote code execution
Several vulnerabilities have been discovered in the Google Android operating system, the most serious of which could allow remote code execution in the context of…
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization Untrusted…
-
Vulnerability in Dell RecoverPoint for Virtual Machines could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-015ISSUE DATE(S):02/18/2026PREVIEW:A vulnerability has been discovered in Dell RecoverPoint for Virtual Machines that could allow arbitrary code execution. Dell RecoverPoint for Virtual Machines…
-
Multiple vulnerabilities in Ivanti Endpoint Manager Mobile could allow remote code execution
MS-ISAC NOTICE NUMBER:2026-009ISSUE DATE(S):01/30/2026PREVIEW:Several vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile that could allow remote code execution. Ivanti Endpoint Manager Mobile is a…













